Mobile Computing Solutions Vehicle Mount Computer VMC 3020 User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Computing Solutions Vehicle Mount Computer VMC 3020 User Manual NEXCOM International Co., Ltd. Mobile Computing Solutions Vehicle Mount Computer VMC 3020 User Manual NEXCOM International Co., Ltd. www.nexcom.com Published July 2017 Contents CONTENTS Preface Getting to Know VMC 3020 ...................................................................5 VMC 3020 Front View .........................................................................5 Copyright .............................................................................................. v VMC 3020 Rear View ..........................................................................5 Disclaimer .............................................................................................. v VMC 3020 Bottom I/O View ................................................................6 Acknowledgements ............................................................................... v VMC 3020 Right I/O View ...................................................................6 Regulatory Compliance Statements ........................................................ v VMC 3020 Left I/O View ......................................................................7 Declaration of Conformity ....................................................................... v VMC 3020 Top I/O View ......................................................................7 RoHS Compliance .................................................................................. vi Warranty and RMA ................................................................................vii Safety Information ...............................................................................viii Chapter 2: Jumpers and Connectors Installation Recommendations ...............................................................viii Before You Begin .................................................................................12 Safety Precautions .................................................................................. ix Precautions ..........................................................................................12 Technical Support and Assistance ............................................................ x Jumper .................................................................................................13 Conventions Used in this Manual ............................................................ x Locations of the Jumpers and Connectors .............................................14 Global Service Contact Information ........................................................ xi Mainboard ........................................................................................14 Headquarters ...................................................................................... xi Internal Connectors and DIP Switch Settings .........................................15 Package Contents .................................................................................xiii WWAN Switch Selection .................................................................15 Ordering Information ............................................................................xiv CANBus Impedance Control ............................................................16 GPIO High-Low Switch ....................................................................16 Chapter 1: Product Introduction Power Input Voltage Selection & iButton/RFID Security On/Off .........17 Battery Connector ...........................................................................17 Overview ................................................................................................1 GPS or COM3 (Tx/Rx) Selection........................................................18 Key Features ...........................................................................................1 GPS Signal and Power .....................................................................18 Hardware Specifications ..........................................................................2 GPS DR Function (Odometer and Direction) .....................................19 Mechanical Dimensions ...........................................................................4 Debug Port .....................................................................................19 VMC 3020 ..........................................................................................4 MCU Debug Port ............................................................................20 Copyright © 2016 NEXCOM International Co., Ltd. All rights reserved ii VMC 3020 User Manual Contents MCU Download Port .......................................................................20 Voltage Setting for Turn-on or Turn-off of the System ........................43 Heater Power ..................................................................................21 Setting for Delay-on & Delay-off ........................................................44 Half-size Mini-PCIe Connector (Wi-Fi and Bluetooth) .......................22 Setting for Delay-on & Delay-off ........................................................45 Full-size Mini-PCIe Connector (WWAN) ...........................................23 WWAN Module Management ...........................................................46 M.2 Connector ..............................................................................24 Setting for Automatic Reboot ............................................................47 Touchscreen Driver Installation ..............................................................48 Chapter 3: Installation of SSD and Modules Installing PenMount Windows Universal Driver Installing a SSD .....................................................................................25 (For 2000/XP/XPT/XPE/2003/VISTA/7/WES7/2008/8) ...........................48 Installing a WLAN & Bluetooth Module .................................................28 Installing PenMount Mouse Driver in Installing a WWAN Module ...................................................................28 Windows 2000/XP/XPT/XPE/2003/VISTA/7/WES7/2008/8 ...................50 Installing a GPS Module ........................................................................29 Installing PenMount Digitizer Driver in Installing a Battery ................................................................................30 Windows XP/Vista/7/WES7/2008/8 ....................................................51 Configuring Touchscreen in PenMount Mouse Driver .........................51 Chapter 4: Software PenMount Control Panel ...................................................................52 PenMount Monitor Menu Icon ..........................................................56 Hotkey Setup Procedure ........................................................................32 PenMount Rotating Function .............................................................56 Installing NEXCOM Function Key App ................................................32 Touchscreen Configuration of PenMount Digitizer Driver ...................57 Applying Administrator Authority ......................................................34 PenMount Control Panel .................................................................58 Setup Hotkey Function ......................................................................35 Uninstalling PenMount Windows Universal Driver ..............................61 Setup Hotkey Function - User Define .................................................36 Installing PenMount Linux X Window USB Driver ...............................62 How to Switch Hotkey Button ...........................................................37 Installing PenMount Linux X Window USB Driver .............................62 Demo Utility ..........................................................................................38 Calibration Utilities ..........................................................................62 WWAN ...........................................................................................38 Installing PenMount WinCE Driver .....................................................62 WWAN Wake Up ...........................................................................38 Installing PenMount WinCE Driver ...................................................62 Heater Function ..............................................................................38 Touchscreen Driver Software Functions..................................................63 Heater Power .................................................................................38 Standard Calibration ..........................................................................65 Low Battery Voltage Protection .......................................................39 Advanced Calibration ........................................................................65 Power Input Type ...........................................................................39 Rotation ............................................................................................65 Delay Time .....................................................................................39 Draw .................................................................................................65 RTC Wake Up Timer .......................................................................39 Mouse Operation Mode ....................................................................67 BIOS Power Management .....................................................................42
Recommended publications
  • [13주차] Sysfs and Procfs
    1 7 Computer Core Practice1: Operating System Week13. sysfs and procfs Jhuyeong Jhin and Injung Hwang Embedded Software Lab. Embedded Software Lab. 2 sysfs 7 • A pseudo file system provided by the Linux kernel. • sysfs exports information about various kernel subsystems, HW devices, and associated device drivers to user space through virtual files. • The mount point of sysfs is usually /sys. • sysfs abstrains devices or kernel subsystems as a kobject. Embedded Software Lab. 3 How to create a file in /sys 7 1. Create and add kobject to the sysfs 2. Declare a variable and struct kobj_attribute – When you declare the kobj_attribute, you should implement the functions “show” and “store” for reading and writing from/to the variable. – One variable is one attribute 3. Create a directory in the sysfs – The directory have attributes as files • When the creation of the directory is completed, the directory and files(attributes) appear in /sys. • Reference: ${KERNEL_SRC_DIR}/include/linux/sysfs.h ${KERNEL_SRC_DIR}/fs/sysfs/* • Example : ${KERNEL_SRC_DIR}/kernel/ksysfs.c Embedded Software Lab. 4 procfs 7 • A special filesystem in Unix-like operating systems. • procfs presents information about processes and other system information in a hierarchical file-like structure. • Typically, it is mapped to a mount point named /proc at boot time. • procfs acts as an interface to internal data structures in the kernel. The process IDs of all processes in the system • Kernel provides a set of functions which are designed to make the operations for the file in /proc : “seq_file interface”. – We will create a file in procfs and print some data from data structure by using this interface.
    [Show full text]
  • Filesystem Considerations for Embedded Devices ELC2015 03/25/15
    Filesystem considerations for embedded devices ELC2015 03/25/15 Tristan Lelong Senior embedded software engineer Filesystem considerations ABSTRACT The goal of this presentation is to answer a question asked by several customers: which filesystem should you use within your embedded design’s eMMC/SDCard? These storage devices use a standard block interface, compatible with traditional filesystems, but constraints are not those of desktop PC environments. EXT2/3/4, BTRFS, F2FS are the first of many solutions which come to mind, but how do they all compare? Typical queries include performance, longevity, tools availability, support, and power loss robustness. This presentation will not dive into implementation details but will instead summarize provided answers with the help of various figures and meaningful test results. 2 TABLE OF CONTENTS 1. Introduction 2. Block devices 3. Available filesystems 4. Performances 5. Tools 6. Reliability 7. Conclusion Filesystem considerations ABOUT THE AUTHOR • Tristan Lelong • Embedded software engineer @ Adeneo Embedded • French, living in the Pacific northwest • Embedded software, free software, and Linux kernel enthusiast. 4 Introduction Filesystem considerations Introduction INTRODUCTION More and more embedded designs rely on smart memory chips rather than bare NAND or NOR. This presentation will start by describing: • Some context to help understand the differences between NAND and MMC • Some typical requirements found in embedded devices designs • Potential filesystems to use on MMC devices 6 Filesystem considerations Introduction INTRODUCTION Focus will then move to block filesystems. How they are supported, what feature do they advertise. To help understand how they compare, we will present some benchmarks and comparisons regarding: • Tools • Reliability • Performances 7 Block devices Filesystem considerations Block devices MMC, EMMC, SD CARD Vocabulary: • MMC: MultiMediaCard is a memory card unveiled in 1997 by SanDisk and Siemens based on NAND flash memory.
    [Show full text]
  • Digital Preservation Guide: 3.5-Inch Floppy Disks Caralie Heinrichs And
    DIGITAL PRESERVATION GUIDE: 3.5-Inch Floppy Disks Digital Preservation Guide: 3.5-Inch Floppy Disks Caralie Heinrichs and Emilie Vandal ISI 6354 University of Ottawa Jada Watson Friday, December 13, 2019 DIGITAL PRESERVATION GUIDE 2 Table of Contents Introduction ................................................................................................................................................. 3 History of the Floppy Disk ......................................................................................................................... 3 Where, when, and by whom was it developed? 3 Why was it developed? 4 How Does a 3.5-inch Floppy Disk Work? ................................................................................................. 5 Major parts of a floppy disk 5 Writing data on a floppy disk 7 Preservation and Digitization Challenges ................................................................................................. 8 Physical damage and degradation 8 Hardware and software obsolescence 9 Best Practices ............................................................................................................................................. 10 Storage conditions 10 Description and documentation 10 Creating a disk image 11 Ensuring authenticity: Write blockers 11 Ensuring reliability: Sustainability of the disk image file format 12 Metadata 12 Virus scanning 13 Ensuring integrity: checksums 13 Identifying personal or sensitive information 13 Best practices: Use of hardware and software 14 Hardware
    [Show full text]
  • I.MX Encrypted Storage Using CAAM Secure Keys Rev
    AN12714 i.MX Encrypted Storage Using CAAM Secure Keys Rev. 1 — 11/2020 Application Note Contents 1 Preface 1 Preface............................................1 Devices often contain highly sensitive information which is consistently at risk 1.1 Intended audience and scope......1 1.2 References...................................1 to get physically lost or stolen. Setting user passwords does not guarantee data 2 Overview......................................... 1 protection against unauthorized access. The attackers can simply bypass the 2.1 DM-Crypt......................................1 software system of a device and access the data storage directly. Only the 2.2 DM-Crypt accelerated by CAAM use of encryption can guarantee data confidentiality in the case where storage .....................................................2 media is directly accessed. 2.3 DM-Crypt using CAAM's Secure Key...............................................3 This document provides steps to run a transparent storage encryption at block 3 Hands-On........................................4 level using DM-Crypt taking advantage of the secure key feature provided 3.1 Installation....................................4 by i.MXs Cryptographic Accelerator and Assurance Module (CAAM). The 3.2 Usage...........................................6 document applies to all i.MX SoCs having CAAM module. The feature is not 3.3 Performance................................ 9 available on i.MX SoCs with DCP. 4 Revision History............................ 10 5 Appendix A. Configuration...........
    [Show full text]
  • Add New Disk and Create /U01 Mount Point Contents
    [email protected] Add new disk and Create /u01 Mount Point Contents 1) Delete existing disk from virtual box ......................................................................... 2 2) Add disk to Virtual Box ....................................................................................................... 7 3) Discover/find the Added Disk: .......................................................................................... 9 4) Format and Create the disk Slice/partition for /u01 mount point .............. 11 5) Create File system and Mount point. ........................................................................... 15 1 | P a g e [email protected] 1) Delete existing disk from virtual box I have to delete existing disk for /u01 to create disk with higher Size. First unmount the /u01 filesystem ================================== mgracsolsrv64bit1:[root]$ df -h |egrep 'Filesystem|u01|u02' Filesystem size used avail capacity Mounted on /dev/dsk/c0t2d0s0 9.9G 10M 9.7G 1% /u01 mgracsolsrv64bit1:[root]$ mount |egrep 'u01|u02' /u01 on /dev/dsk/c0t2d0s0 read/write/setuid/devices/rstchown/intr/largefiles/logging/xattr/onerror=panic/dev =840080 on Mon Oct 14 22:13:44 2013 umount /u01 Remove the entry for /u01 from /etc/vfstab ============================================= vi /etc/vfstab Delete the partition: ======================== # format Searching for disks...done AVAILABLE DISK SELECTIONS: 0. c0t0d0 <ATA -VBOX HARDDISK -1.0 cyl 2085 alt 2 hd 255 sec 63> /pci@0,0/pci8086,2829@d/disk@0,0 1. c0t2d0 <ATA -VBOX HARDDISK
    [Show full text]
  • OSD-Btrfs, a Novel Lustre OSD Based on Btrfs
    2015/04/15 OSD-Btrfs, A Novel Lustre OSD based on Btrfs Shuichi Ihara Li Xi DataDirect Networks, Inc DataDirect Networks, Inc ©2015 DataDirect Networks. All Rights Reserved. ddn.com Why Btrfs for Lustre? ► Lustre today uses ldiskfs(ext4) or, more recently, ZFS as backend file system ► Ldiskfs(ext4) • ldiskfs(ext4) is used widely and exhibits well-tuned performance and proven reliability • But, its technical limitations are increasingly apparent, it is missing important novel features, lacks scalability, while offline fsck is extremely time-consuming ► ZFS • ZFS is an extremely feature-rich file system • but, for use as Lustre OSD further performance optimization is required • Licensing and potential legal issues have prevented a broader distribution ► Btrfs • Btrfs shares many features and goals with ZFS • Btrfs is becoming sufficiently stable for production usage • Btrfs is available through the major mainstream Linux distributions • Pachless server support. Simple Lustre setup and easy maintenance 2 ©2015 DataDirect Networks. All Rights Reserved. ddn.com Attractive Btrfs Features for Lustre (1) ► Features that improve OSD internally • Integrated multiple device support: RAID 0/1/10/5/6 o RAID 0 results in less OSTs per OSS and simplifies management, while improving the performance characteristics of a single OSD o RAID 1/10/5/6 improves reliability of OSDs • Dynamic inode allocation o No need to worry about formatting the MDT with wrong option to cause insufficient inode number • crc32c checksums on data and metadata o Improves OSD reliability • Online filesystem check and very fast offline filesystem check (planed) o Drives are getting bigger, but not faster, which leads to increasing fsck times 3 ©2015 DataDirect Networks.
    [Show full text]
  • Chapter 8: Disks and Filesystems
    8 D I S K S A N D F I L ESYSTEMS Oh, my head hurts bad. Rings of ones and zeros, ouch! Filesystems hide them. Proper data management is perhaps a sys- tems administrator’s most vital duty. You can replace almost every computer compo- nent, but the data on your disk is irreplace- able. Perhaps that data isn’t important or it’s backed up, but losing files will ruin your day. As a sysadmin, you must protect important data by carefully manag- ing your disks and filesystems. We covered the basics of disklabels and MBR partitions in Chapter 2, but OpenBSD lets you use and abuse disks and filesystems in any number of ways. You’ll learn how in this chapter. !"#$%&'()*+(,-./0)1,2)(23'3$,) 415670)839:;(%)<=)>&9;# Device Nodes A device node is a file that provides a logical interface to a piece of hardware. By reading from a device node, sending data to it, or using a command on it, you’re telling the operating system to perform an action on a piece of hardware or, in some cases, a logical device. Different devices behave differently when data is sent to them. For example, writing to the console makes text appear on the screen or termi- nal, while writing to a disk device puts data on that disk. (OpenBSD puts device nodes in /dev and disallows device nodes on other filesystems.) Many disk management programs expect to be given a device name as an argument. Unfortunately, device node names are frequently cryptic and vary widely among operating systems—even on closely related operat- ing systems that run on the same hardware.
    [Show full text]
  • Remote Filesystem Event Notification and Processing for Distributed Systems
    ICDT 2021 : The Sixteenth International Conference on Digital Telecommunications Remote Filesystem Event Notification and Processing for Distributed Systems Kushal Thapa†‡, Vinay Lokesh*#, Stan McClellan†§ †Ingram School of Engineering *Dept. of Computer Science Texas State University San Marcos, TX, USA e-mail: ‡[email protected], #[email protected], §[email protected] Abstract— Monitoring and safeguarding the integrity of files networking solutions and architectures allow the users to in local filesystems is imperative to computer systems for many circumvent certain firewall restrictions, thus increasing purposes, including system security, data acquisition, and other complexity while introducing security risks. Here, we leverage processing requirements. However, distributed systems may the well-known network architecture where an Internet- have difficulty in monitoring remote filesystem events even reachable system acts as a middleman to establish a secure, though asynchronous notification of filesystem events on a bidirectional network connection between firewalled devices. remote, resource-constrained device can be very useful. This This approach is not new, however, comprehensive analysis paper discusses several aspects of monitoring remote filesystem of various parameters is difficult to obtain, so we provide some events in a loosely-coupled and distributed architecture. This results and discussion regarding the various configuration paper investigates a simple and scalable technique to enable secure remote file system monitoring using existing Operating options and performance of this architecture. System resident tools with minimum overhead. In Section II of this paper, we describe various tools that are generally used to monitor local filesystem events. We also Keywords— Secure Remote Filesystem Monitoring; Firewall; briefly discuss about Secure Shell Protocol Filesystem Distributed Architecture; Secure Network Communication; SSH; (SSHFS) [9] and Secure Shell Protocol (SSH) [12].
    [Show full text]
  • Btrfs the Filesystemsswiss Army Knife of Storage JOSEF BACIK
    Btrfs The FILESYSTEMSSwiss Army Knife of Storage JOSEF BACIK Josef is the lead developer Btrfs is a new file system for Linux that has been under development for four years on Btrfs for Red Hat. He cut now and is based on Ohad Rodeh’s copy-on-write B-tree . Its aim is to bring more his teeth on the clustered file efficient storage management and better data integrity features to Linux . It has system GFS2, moving on to been designed to offer advanced features such as built-in RAID support, snapshot- help maintain ext3 for Red Hat until Btrfs was ting, compression, and encryption . Btrfs also checksums all metadata and will publicly announced in 2007. checksum data with the option to turn off data checksumming . In this article I [email protected] explain a bit about how Btrfs is designed and how you can use these new capabili- ties to your advantage . Historically, storage management on Linux has been disjointed . You have the traditional mdadm RAID or the newer dmraid if you wish to set up software RAID . There is LVM for setting up basic storage management capable of having separate volumes from a common storage pool as well as the ability to logically group disks into one storage pool . Then on top of your storage pools you have your file system, usually an ext variant or XFS . The drawback of this approach is that it can get complicated when you want to change your setup . For example, if you want to add another disk to your logical volume in order to add more space to your home file system, you first must initialize and add that disk to your LVM volume group, then extend your logical volume, and only then extend your file system .
    [Show full text]
  • Z/OS Unix and Zfs Sysplex Sharing
    z/OS Unix and zFS Sysplex Sharing Scott Marcotte February 8, 2013 9:30AM Yosemite B Session Number 13023 [email protected] Insert Custom Session QR if Desired. 11 The z/OS UNIX file system � General user view of file system tree: / u bin usr SYSTEM dev tmp var etc 2 5 February 2013 © 2013 IBM Corporation Regardless of whether z/OS Unix Sysplex Sharing is used or not, a general user application will see the standard Unix file system tree. 2 The z/OS UNIX file system … � The z/OS hierarchical file system is actually a bit more involved than the previous slide shows � The sysplex shared file system environment needs to support multiple concurrent z/OS releases and even multiple concurrent service levels for different LPARs in a single file system hierarchy � We also want to support system specific file systems � The sysplex shared file system environment uses special mount points and symbolic links with system symbols to provide this � Even a single system uses symbolic links to allow easy transition to the shared file system environment � But, the end user view of the z/OS UNIX hierarchical file system does not change whether they are in a sysplex environment or not 3 5 February 2013 © 2013 IBM Corporation 3 The z/OS UNIX file system … / u bin usr SYSTEM dev tmp var etc $SYSNAME/dev $SYSNAME/var $SYSNAME/tmp $SYSNAME/etc bin usr dev tmp var etc /bin /usr 4 5 February 2013 © 2013 IBM Corporation If the content of the symbolic link begins with $SYSNAME and SYSPLEX is specified NO, then $SYSNAME is replaced with /SYSTEM when the symbolic link is resolved.
    [Show full text]
  • Distributed File Service Zfs Administration
    z/OS Version 2 Release 3 Distributed File Service zFS Administration IBM SC23-6887-30 Note Before using this information and the product it supports, read the information in “Notices” on page 469. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-03-28 © Copyright International Business Machines Corporation 2001, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii How this document is organized............................................................................................................... xiii Conventions used in this document ......................................................................................................... xiii z/OS information........................................................................................................................................xiv References to DFS information................................................................................................................. xiv How to send your comments to
    [Show full text]
  • Vmware-Mount Command‐Line Utility
    VMware Disk Mount User’s Guide Virtual Disk Development Kit VMware Disk Mount User’s Guide VMware Disk Mount User’s Guide Item: EN-000055-01 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2008 VMware, Inc. All rights reserved. Protected by one or more U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,944,699, 6,961,806, 6,961,941, 7,069,413, 7,082,598, 7,089,377, 7,111,086, 7,111,145, 7,117,481, 7,149,843, 7,155,558, 7,222,221, 7,260,815, 7,260,820, 7,269,683, 7,275,136, 7,277,998, 7,277,999, 7,278,030, 7,281,102, 7,290,253, 7,356,679, 7,409,487, 7,412,492, 7,412,702, 7,424,710, and 7,428,636; patents pending. VMware, the VMware “boxes” logo and design, Virtual SMP, and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 5 Using VMware Disk Mount 7 Limitations on Mounting Virtual Disks 7 Running VMware Disk Mount on a Windows Host 8 Log Files 8 Examples Using VMware Disk Mount on a Windows Host 9 Running VMware Disk Mount on a Linux Host 10 Log File 10 Examples Using VMware Disk Mount on a Linux Host 11 Installing the Fuse Package 12 VMware, Inc.
    [Show full text]